Media coverage

Slingshot router malware: A warning for businesses

Sorry, this post has not been published yet, check again later!

March 15, 2018
Published by:

Computer Weekly

“A behavior-based approach is required to spot the very weak signals of compromise that identify post-intrusion attacker activity within the network," says Matt Walmsley, director of EMEA at Vectra. "But this can be a laborious and slow, and delivers poor results if performed manually,”

Read publication

Most recent media coverage

What’s cybercriminals’ most effective weapon in a ransomware attack?

September 19, 2019

(In)secure Magazine

Read more

Cyberwar is here: Are you ready?

September 19, 2019

PC Magazine

Read more

Capital One: What’s in your cloud?

September 19, 2019

Security Magazine

Read more